Across
- 3. personal identifaction number
- 5. transaction authorization number
- 7. authentication Something the shows who the user is.
- 10. type of cetiface used to make a credit card transactions secure.
- 12. a security system that controls network traffic to protect against unauthorized access.
- 13. banking The type of banking where you can use mobile phone networks to perform transactions.
- 14. buying and selling of goods or services over the internet.
- 15. the most common type of e-commerece.
Down
- 1. a cyberattack where attackers trick individuals into revealing sensitive information, like passwords or credit card details, by impersonating legitimate entities.
- 2. This is malicious software designed to secretly collect user data without their consent.
- 4. The type of commerce that links two firms.
- 6. self copying programs
- 8. Computer criminals who use technology to perform a variety of crimes.
- 9. malicious software what is designed to damage, disrupt, or gain unauthorized access to computer systems or data
- 11. the act of illegally copying, distributing, or using software, media, or other copyrighted content.
